000 | 03559cam a2200577Ii 4500 | ||
---|---|---|---|
001 | ocn910662542 | ||
003 | OCoLC | ||
005 | 20190328114811.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150604s2015 mau ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dCUS _dEBLCP _dN$T _dOPELS _dOCLCO _dIDEBK _dYDXCP _dE7B _dDEBSZ _dOCLCO _dUIU _dOCLCO _dCDX _dCOO _dOCLCO _dSTF _dB24X7 _dD6H _dZ5A _dVT2 _dLIV _dOCLCQ _dU3W _dOCLCF _dOCLCQ _dWYU _dOCLCO |
||
019 |
_a934503252 _a988657789 _a993505315 _a1008950458 _a1066594645 |
||
020 |
_a9780128017807 _q(electronic bk.) |
||
020 |
_a0128017805 _q(electronic bk.) |
||
020 | _a0128015950 | ||
020 | _a9780128015957 | ||
020 | _z9780128015957 | ||
035 |
_a(OCoLC)910662542 _z(OCoLC)934503252 _z(OCoLC)988657789 _z(OCoLC)993505315 _z(OCoLC)1008950458 _z(OCoLC)1066594645 |
||
050 | 4 | _aQA76.585 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 0 | 4 |
_aThe cloud security ecosystem : technical, legal, business and management issues / _h[electronic resource] _cedited by Ryan Ko, Kim-Kwang Raymond Choo. |
264 | 1 |
_aWaltham, MA : _bSyngress, _c2015 |
|
264 | 4 | _c�2015 | |
300 | _a1 online resource (530 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aVendor-supplied metadata. | |
505 | 0 | _aPart 1. Plan: threats, risk, and requirement landscape -- Part 2. Do: cloud security approaches and challenges -- Part 3. Check: forensics and incident response -- Part 4. Act: governance and auditing. | |
520 |
_aThis book discusses cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. It presents the most current research on cloud security from a multi-disciplinary standpoint focusing on technical, legal, and business management issues involved in implementing effective cloud security, including case examples. Other topics include: cloud trust protocols; cryptographic deployment; mobile devices and BYOD security management; auditability and accountability; emergency and incident response; cloud forensics; cloud data governance; mitigation and liability of international cloud deployment; legal boundaries; risk management; cloud information security management plans; economics of cloud security; standardization efforts. -- _cEdited summary from book. |
||
650 | 0 |
_aCloud computing _xSecurity measures. |
|
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aData protection. _2fast _0(OCoLC)fst00887958 |
|
650 | 7 |
_aInformation technology _xSecurity measures. _2fast _0(OCoLC)fst00973129 |
|
650 | 7 |
_aDatormoln _xs�akerhetsaspekter. _2sao |
|
655 | 4 | _aElectronic books. | |
655 | 0 | _aElectronic book. | |
700 | 1 |
_aKo, Ryan, _eeditor. |
|
700 | 1 |
_aChoo, Raymond, _eeditor. |
|
776 | 0 | 8 |
_iPrint version: _tCloud security ecosystem : technical, legal, business and management issues. _dAmsterdam, [Netherlands] : Syngress, �2015 _hxxxix, 530 pages _z9780128015957 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128015957 |
999 |
_c247097 _d247097 |